3129 Results for



The biggest tech turkeys of 2015

The year's most notable embarrassments in technology run the gamut from the industry's inability to secure our personal data to the blunders of Airbnb, Twitter and Tinder.

By November 24, 2015


Dell to fix flaw of its own making that puts its computers at risk

The company acknowledges it recently sold PCs loaded with a form of identification that could make them vulnerable to cyberattack.

By November 24, 2015


Every Android device is vulnerable to newly discovered bugs

With two new "Stagefright" vulnerabilities discovered, almost every Android device ever released is vulnerable to malicious hackers. Fixing the bug isn't simple.

By October 1, 2015


Apple iOS 9 fixes serious AirDrop vulnerability

The newly discovered vulnerability could lead to bad guys taking remote control of iPhones and Macs.

By September 17, 2015


Android Stagefright vulnerability leaves handsets at risk

A security research company claims to have found a vulnerability baked into Google's Android operating system that could leave devices open to attack. CNET's Lexy Savvides reports on how Google has addressed the issue and how users can minimize the risk.

By July 27, 2015


Mozilla patches critical vulnerabilities in Firefox update

The latest update to the browser fixes a number of critical and high-risk vulnerabilities.

By July 9, 2015


Mac's sleep mode vulnerability rated critical by Symantec

The security flaw could allow attackers to install malware able to survive hardware formatting.

By June 5, 2015


Veracode study pokes holes in smart-home security

An in-depth look at the security behind six well-known smart-home products shows some alarming vulnerabilities.

By April 9, 2015


More than 1,200 popular Android apps still vulnerable to FREAK

Researchers from FireEye claim the security risks posed by the FREAK bug are far from over.

By March 18, 2015


Microsoft Windows vulnerable to 'FREAK' encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

By March 5, 2015